Summary of Alerts

Risk LevelNumber of Alerts
High0
Medium2
Low4
Informational2

Alerts

NameRisk LevelNumber of Instances
Vulnerable JS LibraryMedium2
X-Frame-Options Header Not SetMedium2
Cookie No HttpOnly FlagLow2
Cookie Without SameSite AttributeLow2
Incomplete or No Cache-control and Pragma HTTP Header SetLow14
X-Content-Type-Options Header MissingLow26
Information Disclosure - Suspicious CommentsInformational22
Timestamp Disclosure - UnixInformational14

Alert Detail

Medium (Medium)Vulnerable JS Library
Description

The identified library jquery, version 1.11.2.min is vulnerable.

URLhttps://support.digitallocker.gov.in/js/jquery-1.11.2.min.js?9ae093d
MethodGET
Evidencejquery-1.11.2.min.js
URLhttps://support.digitallocker.gov.in/js/jquery-ui-1.10.3.custom.min.js?9ae093d
MethodGET
Evidence/*! jQuery UI - v1.10.3 - 2013-10-08 * http://jqueryui.com * Includes: jquery.ui.core.js, jquery.ui.widget.js, jquery.ui.mouse.js, jquery.ui.position.js, jquery.ui.draggable.js, jquery.ui.droppable.js, jquery.ui.resizable.js, jquery.ui.selectable.js, jquery.ui.sortable.js, jquery.ui.accordion.js, jquery.ui.autocomplete.js, jquery.ui.button.js, jquery.ui.datepicker.js, jquery.ui.dialog.js
Instances2
Solution

Please upgrade to the latest version of jquery.

Other information

CVE-2020-11023

CVE-2020-11022

CVE-2015-9251

CVE-2019-11358

Reference

https://github.com/jquery/jquery/issues/2432

http://blog.jquery.com/2016/01/08/jquery-2-2-and-1-12-released/

http://research.insecurelabs.org/jquery/test/

https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/

https://nvd.nist.gov/vuln/detail/CVE-2019-11358

https://nvd.nist.gov/vuln/detail/CVE-2015-9251

https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b

https://bugs.jquery.com/ticket/11974

https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/

CWE Id829
Source ID3
Medium (Medium)X-Frame-Options Header Not Set
Description

X-Frame-Options header is not included in the HTTP response to protect against 'ClickJacking' attacks.

URLhttps://support.digitallocker.gov.in
MethodGET
ParameterX-Frame-Options
URLhttps://support.digitallocker.gov.in/
MethodGET
ParameterX-Frame-Options
Instances2
Solution

Most modern Web browsers support the X-Frame-Options HTTP header. Ensure it's set on all web pages returned by your site (if you expect the page to be framed only by pages on your server (e.g. it's part of a FRAMESET) then you'll want to use SAMEORIGIN, otherwise if you never expect the page to be framed, you should use DENY. Alternatively consider implementing Content Security Policy's "frame-ancestors" directive.

Reference

https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Frame-Options

CWE Id16
WASC Id15
Source ID3
Low (Medium)Cookie No HttpOnly Flag
Description

A cookie has been set without the HttpOnly flag, which means that the cookie can be accessed by JavaScript. If a malicious script can be run on this page then the cookie will be accessible and can be transmitted to another site. If this is a session cookie then session hijacking may be possible.

URLhttps://support.digitallocker.gov.in
MethodGET
ParameterOSTSESSID
EvidenceSet-Cookie: OSTSESSID
URLhttps://support.digitallocker.gov.in/
MethodGET
ParameterOSTSESSID
EvidenceSet-Cookie: OSTSESSID
Instances2
Solution

Ensure that the HttpOnly flag is set for all cookies.

Reference

https://owasp.org/www-community/HttpOnly

CWE Id16
WASC Id13
Source ID3
Low (Medium)Cookie Without SameSite Attribute
Description

A cookie has been set without the SameSite attribute, which means that the cookie can be sent as a result of a 'cross-site' request. The SameSite attribute is an effective counter measure to cross-site request forgery, cross-site script inclusion, and timing attacks.

URLhttps://support.digitallocker.gov.in
MethodGET
ParameterOSTSESSID
EvidenceSet-Cookie: OSTSESSID
URLhttps://support.digitallocker.gov.in/
MethodGET
ParameterOSTSESSID
EvidenceSet-Cookie: OSTSESSID
Instances2
Solution

Ensure that the SameSite attribute is set to either 'lax' or ideally 'strict' for all cookies.

Reference

https://tools.ietf.org/html/draft-ietf-httpbis-cookie-same-site

CWE Id16
WASC Id13
Source ID3
Low (Medium)Incomplete or No Cache-control and Pragma HTTP Header Set
Description

The cache-control and pragma HTTP header have not been set properly or are missing allowing the browser and proxies to cache content.

URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/ui-lightness/jquery-ui-1.10.3.custom.min.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/redactor.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/rtl.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/assets/default/css/landing_v4.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/flags.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/thread.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/select2.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/assets/default/css/print.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/osticket.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/assets/default/css/theme.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/scp/css/typeahead.css?9ae093d
MethodGET
ParameterCache-Control
URLhttps://support.digitallocker.gov.in/css/font-awesome.min.css?9ae093d
MethodGET
ParameterCache-Control
Instances14
Solution

Whenever possible ensure the cache-control HTTP header is set with no-cache, no-store, must-revalidate; and that the pragma HTTP header is set with no-cache.

Reference

https://cheatsheetseries.owasp.org/cheatsheets/Session_Management_Cheat_Sheet.html#web-content-caching

CWE Id525
WASC Id13
Source ID3
Low (Medium)X-Content-Type-Options Header Missing
Description

The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.

URLhttps://support.digitallocker.gov.in/assets/default/css/print.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/select2.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/jquery-ui-1.10.3.custom.min.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/font-awesome.min.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/select2.min.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/osticket.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/jquery-1.11.2.min.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/ui-lightness/jquery-ui-1.10.3.custom.min.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/redactor.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/rtl.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/redactor.min.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/scp/js/bootstrap-typeahead.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/flags.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/scp/css/typeahead.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
ParameterX-Content-Type-Options
URLhttps://support.digitallocker.gov.in/css/osticket.css?9ae093d
MethodGET
ParameterX-Content-Type-Options
Instances26
Solution

Ensure that the application/web server sets the Content-Type header appropriately, and that it sets the X-Content-Type-Options header to 'nosniff' for all web pages.

If possible, ensure that the end user uses a standards-compliant and modern web browser that does not perform MIME-sniffing at all, or that can be directed by the web application/web server to not perform MIME-sniffing.

Other information

This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.

At "High" threshold this scan rule will not alert on client or server error responses.

Reference

http://msdn.microsoft.com/en-us/library/ie/gg622941%28v=vs.85%29.aspx

https://owasp.org/www-community/Security_Headers

CWE Id16
WASC Id15
Source ID3
Informational (Low)Information Disclosure - Suspicious Comments
Description

The response appears to contain suspicious comments which may help an attacker. Note: Matches made within script blocks or files are against the entire content not only comments.

URLhttps://support.digitallocker.gov.in/js/redactor.min.js?9ae093d
MethodGET
EvidencedB
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
Evidencebug
URLhttps://support.digitallocker.gov.in/scp/js/bootstrap-typeahead.js?9ae093d
MethodGET
Evidenceselect
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
Evidencequery
URLhttps://support.digitallocker.gov.in/js/filedrop.field.js?9ae093d
MethodGET
EvidenceTODO
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
EvidenceXXX
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
EvidenceTODO
URLhttps://support.digitallocker.gov.in/js/jquery-ui-1.10.3.custom.min.js?9ae093d
MethodGET
Evidenceselect
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
Evidencebug
URLhttps://support.digitallocker.gov.in/js/jquery-1.11.2.min.js?9ae093d
MethodGET
Evidenceusername
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
Evidenceuser
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
EvidenceFIXME
URLhttps://support.digitallocker.gov.in/scp/js/bootstrap-typeahead.js?9ae093d
MethodGET
Evidencequery
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
Evidenceselect
URLhttps://support.digitallocker.gov.in/js/filedrop.field.js?9ae093d
MethodGET
Evidencefrom
URLhttps://support.digitallocker.gov.in/js/select2.min.js?9ae093d
MethodGET
Evidencequery
URLhttps://support.digitallocker.gov.in/js/osticket.js?9ae093d
MethodGET
EvidenceTODO
URLhttps://support.digitallocker.gov.in/js/redactor-plugins.js?9ae093d
MethodGET
EvidenceTODO
URLhttps://support.digitallocker.gov.in/js/redactor-osticket.js?9ae093d
MethodGET
EvidenceFIXME
URLhttps://support.digitallocker.gov.in/js/fabric.min.js?9ae093d
MethodGET
Evidencefrom
Instances22
Solution

Remove all comments that return information that may help an attacker and fix any underlying problems they refer to.

Other information

The following pattern was used: \bDB\b and was detected in the element starting with: "eval(function(p,a,c,k,e,d){e=function(c){return(c<a?'':e(parseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};", see evidence field for the suspicious comment/snippet.

Reference

CWE Id200
WASC Id13
Source ID3
Informational (Low)Timestamp Disclosure - Unix
Description

A timestamp was disclosed by the application/web server - Unix

URLhttps://support.digitallocker.gov.in/assets/default/css/theme.css?9ae093d
MethodGET
Evidence1319655200
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
Evidence42857143
URLhttps://support.digitallocker.gov.in/js/jquery-ui-1.10.3.custom.min.js?9ae093d
MethodGET
Evidence0123456789
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
Evidence33333333
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
Evidence33333333
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
Evidence66666667
URLhttps://support.digitallocker.gov.in/css/thread.css?9ae093d
MethodGET
Evidence428571429
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
Evidence80000000
URLhttps://support.digitallocker.gov.in/assets/default/css/theme.css?9ae093d
MethodGET
Evidence1319556657
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
Evidence00000000
URLhttps://support.digitallocker.gov.in/assets/default/css/bootstrap.css?9ae093d
MethodGET
Evidence80000000
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
Evidence00000000
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
Evidence42857143
URLhttps://support.digitallocker.gov.in/assets/default/css/stylemin.css?9ae093d
MethodGET
Evidence66666667
Instances14
Solution

Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.

Other information

1319655200, which evaluates to: 2011-10-26 14:53:20

Reference

http://projects.webappsec.org/w/page/13246936/Information%20Leakage

CWE Id200
WASC Id13
Source ID3